VPN Security Monitoring SureLog SIEM Use Cases
Monitor VPN connection from an anonymous proxyMonitor connection to VPN providers and datacenters.
Anomaly Detection with SureLog SIEM UEBA Module Using RPCA
Anomaly detection in sequence data is becoming more and more important to detect
Anomaly Detection with SureLog SIEM UEBA Module Using Markov Chain
Anomaly detection in sequence data is becoming more and more important to detect
SURELOG TAXONOMY
A taxonomy improves the scope and stability of correlation rules. It also aids
Threat Detection and Hunting with MITRE ATT&CK Techniques Using SureLog SIEM
Spearphishing Link (T1192) Spearphishing with a link is a specific variant of spearphishing. It
SureLog Intelligent Response
SureLog Intelligent Response
Detecting Attacks with SureLog SIEM
Detecting Attacks with SureLog SIEM
Detecting Unusual Activities Using SureLog Next Generation SIEM –Use Cases Part 2
This article is part of a series. Check out the full series Part1 [1]. The efficiency and effectiveness of security
Detecting Unusual Activities Using SureLog Next Generation SIEM: Use Cases
Next-Gen SIEMs have brought new capabilities to organizations and their security teams. They’re built from the ground
SureLog Correlation Rule Development Example Video
https://www.youtube.com/watch?v=1jbWtewE-FM&t=35s